penalyze2 is a malware analyzation tool that is developed and runs on GNU/Linux. It analyzes Windows (PE) executable files by emulating both an x86 processor and a Windows enviroment.

The goal of this project is to come up with a Free Software solution for malware analysts. It will be able to circumvent executable packers/encrypters by simply emulating their unpacking/uncrypting code. Additionally it will give its user detailed information about what the program is doing to the system by displaying all library (and hence kernel) calls that are made.

There are also two mailing lists, namely penalyze2-commit at nongnu.org, being the place where CVS commit notifications go to, and penalyze2-discussion at nongnu.org, a general development discussion list.

The project is currently looking for a web-developer/-designer to develop a homepage for the project. The homepage is meant to provide information on the project and contain the doxygen-generated API documentation of penalyze2.

Basically this is a webmaster job. You would design the page, write the code and keep it up-to-date. If you are interested contact sp--sp.or.at.